Manage

Loading...

Course Overview

Loading...

Suggested time commitment: 3 weeks of study, 3-4 hours/week

In this self-paced online course, you will learn how PI Identities and PI AF Identities are mapped to applications and active directory accounts and how custom permissions are configured for each of these identities. You will also learn how to meet OSIsoft best practices for a secure PI System.

There are 7 hands-on exercises tailored to apply the knowledge you've learned in the video lectures. By the end of the course, you will have a working knowledge and new skills to use toward securing your PI System.

Before Getting Started

Loading...

PI System Administration for IT Professionals Workbook

This online course follows some of the same curricula as the "PI System Administration for IT Professionals" classroom training. Before start watching the lectures, download a copy of the pdf course workbook, available in 9 different languages, from our tech support download center> Training Materials. Some of the exercises and lessons may be useful while completing the course.

Note: This online course will only cover security modules of the classroom course. To learn more about PI System administration, please refer to the online course catalogue.

Learning modules

Loading...

Below are the video lectures for this course. We have placed the topics in the same order as they would be presented in a live instructor-led course. However, feel free to view the videos in any order, spread over any interval. You can also rewind and rewatch parts of the videos that you need to view again. Also be sure to check out the Online Course Videos - Tips and Tricks if your videos look fuzzy!

Meet the Course Author

Loading...

Want to earn a certificate in this course?

Loading...

currently enrolled in this course?

Loading...

Final Project

Loading...

Creating a custom security plan for your organization

The course ends with a challenge to create a plan for applying everything you've learned to your own PI System. For your final project, you need to create a custom security plan for your organization and either